Deploying Threat Intelligence Platforms- in 10min or less.

Deploying Threat Intelligence Platforms- in 10min or less.

If you run an open-source project, you have no time to spend on testing deployments- so you AUTOMATE ALL THE THINGS, from testing to install, across as many platforms as you possibly can.. because if you give folks documentation, they will not read it, but if you give them an easybutton- they'll BASH THE HELL OUT OF IT. What you quickly figure out- is how many different ways they'll then want to bend, tweak and scale out your application. This leads to more questions, more answers, more time (did I mention you're not really making any money from this, it's all goodwill...  you learn a lot, but you also lose a lot of time with your family... depending on your situation, maybe good, maybe bad).

Mining BitCo^H^H^H^H^HSpam...

Mining BitCo^H^H^H^H^HSpam...

For anyone that's ever tried, there's no 'one way' to parse email, it's one of those long standing protocols that was developed during a different period of time, is extremely resilient, can carry just about anything, works across different encodings, systems and will do just about anything you want it to. The very thing that makes it so versatile- is the very thing that makes it extremely difficult to parse- well. Transporting email is easy, most of the headers and other implementation details in the RFC define that pretty well. It's what IN the messages that's important (and hard)....

Only small business can protect the Internet

Only small business can protect the Internet

I am a trader.

Not in the Wolf of Wall-Street sense (hookers and blow really aren't my thing), but in the “I make about 3,000 trades a year against my house and my family’s future” kind of sense. I’m part of a growing segment of the population that sees things in the world- then immediately checks the volatility futures to see whether “the community” is freaking out over something that most of the world truly cares about (eg: are people selling this news?).....